Search results

1 – 10 of 40
Open Access
Article
Publication date: 2 August 2021

Botong Xue, Feng Xu, Xin Luo and Merrill Warkentin

A growing number of studies have investigated the effect of ethical leadership on behavioral outcome of employees. However, considering the important role of ethics in IS…

2455

Abstract

Purpose

A growing number of studies have investigated the effect of ethical leadership on behavioral outcome of employees. However, considering the important role of ethics in IS security, the security literature lacks a theoretical and empirical investigation of the relationship between ethical leadership and employees' security behavior, such as information security policy (ISP) violation. Drawing on social learning and social exchange theories, this paper empirically tests the impact of ethical leadership on employees' ISP violation intention through both information security climate (i.e. from a moral manager's perspective) and affective commitment (i.e. from a moral person's perspective).

Design/methodology/approach

The research was developed based on social learning theory and social exchange theory. To measure the variables in the model, the authors used and adapted measurement items from previous studies. The authors conducted a scenario-based survey with 339 valid responses to test and validate the research model.

Findings

Results indicated that information security climate fully mediates the relationship between ethical leadership and ISP violation intention. The authors also found that information security climate enhances the negative effect of affective commitment on ISP violation intention.

Originality/value

This research contributes to the literature of information security by introducing the role of ethical leadership and integrating two theories into our research model. This study also calls attention to how information security climate and affective commitment mediate the relationship between ethical leadership and employees' ISP violation intention. The theory-driven study provides important pragmatic guidance for enhancing the understanding of the importance of ethical leadership in information systems security research.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 1 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 9 August 2023

Xin (Robert) Luo and Fang-Kai Chang

The purpose of this study is to demonstrate that Strategic Enterprise Management (SEM) and Business Intelligence (BI) have the potential to integrate management decisions…

Abstract

Purpose

The purpose of this study is to demonstrate that Strategic Enterprise Management (SEM) and Business Intelligence (BI) have the potential to integrate management decisions vertically through an organization’s hierarchy. This study also aims to present a design theory framework and build a model dimension using eight principles serving as mid-range theories.

Design/methodology/approach

This study uses a design science perspective to posit how organizations can successfully implement SEMBI (a union of SEM and BI). This study then completes the design theory by building the method dimension using two principles. Finally, the study presents testable hypotheses for the theory and an evaluation using stakeholder attitudes and judgments as proxies for objective measures.

Findings

In the search for a prescription for SEMBI success, this study finds that the notion of the Capability Maturity Model (CMM) is a good artifact with which to organize the principles the authors are seeking. CMM has since been adapted to suit different contexts by incorporating relevant principles from those domains. Hereafter, this study refers to SEMBI–CMM as the adapted solution for SEMBI's success.

Originality/value

This study coins and uses the term SEMBI to represent the union of SEM and BI. This term retains its distinct identities and principles and forms a holistic and integrated view of SEM and BI implementation strategies. In an effort to advance this line of research, this study employs a design science perspective to address the question of how an organization can successfully implement SEMBI.

Details

Journal of Electronic Business & Digital Economics, vol. 2 no. 2
Type: Research Article
ISSN: 2754-4214

Keywords

Open Access
Article
Publication date: 29 September 2021

Gurvirender Tejay and Gary Klein

621

Abstract

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 1 no. 1
Type: Research Article
ISSN: 2635-0270

Open Access
Article
Publication date: 21 December 2017

Xin Li, Verner Worm and Peihong Xie

The paper debunks Peter P. Li’s assertion that Yin-Yang is superior to any other cognitive frames or logical systems for paradox research. The purpose of this paper is to alert…

3113

Abstract

Purpose

The paper debunks Peter P. Li’s assertion that Yin-Yang is superior to any other cognitive frames or logical systems for paradox research. The purpose of this paper is to alert the Chinese indigenous management researchers to the danger of Chinese exceptionalism and over-confidence.

Design/methodology/approach

To show that Peter P. Li’s assertion is doubtful, the authors identify the flaws in his analysis.

Findings

The authors find that there are three serious flaws in Peter P. Li’s analysis. First, there are four defects in the typology of cognitive frames he built in order to compare Yin-Yang with the others. Second, his understanding of dialectics in general and Hegelian dialectics in particular is flawed. And finally, without resorting to Yin-Yang, many scholars can develop theories that are equivalent to those derived from Yin-Yang.

Research limitations/implications

Due to the page limit, this paper only focuses on arguing that Yin-Yang is not superior to other cognitive frames or logical systems without going one step further to explain in which situations Yin-Yang are valuable and might be more suitable than others for helping us understand some research issues.

Practical implications

This paper implies that we should not blindly believe that the Chinese way of thinking and acting is superior to other people’s. Chinese people should be open-minded in the globalized era, not only promoting their own culture but also appreciating and learning from other cultures.

Social implications

The reduction of cultural exceptionalism and ethnocentrism can make cross-cultural communication and interaction smoother.

Originality/value

This paper is a rigorous critique on the “Yin-Yang being superior” assertion of Peter P. Li.

Details

Cross Cultural & Strategic Management, vol. 25 no. 3
Type: Research Article
ISSN: 2059-5794

Keywords

Open Access
Article
Publication date: 7 February 2018

Xin Li

The purpose of this paper is to comment on Professor Ming-Jer Chen’s recent publication titled “Competitive dynamics: Eastern roots, Western growth” and present an asymmetry…

5063

Abstract

Purpose

The purpose of this paper is to comment on Professor Ming-Jer Chen’s recent publication titled “Competitive dynamics: Eastern roots, Western growth” and present an asymmetry reversing perspective on the competitive dynamics between two nonobvious, invisible or indirect competitors, namely, how emerging market resource-poor firms compete and outcompete advanced country resource-rich rivals.

Design/methodology/approach

The author first identifies an important neglect in Professor Chen’s scholarship on competitive dynamics, i.e., the neglect of the ubiquity of the less visible competition between two actors who initially would not be considered as competitors. Then, the author proposes an asymmetry reversing theory (ART) of competitive dynamics to redress this neglect. The theory is presented in two parts. The first part describes the competitive dynamics between the two actors as a three-stage process of reversing the asymmetry in resource possession and market position between the resource-poor firm and its resource-rich rivals. The second part explains the key success factors for the resource-poor firm to go through each of the three stages.

Findings

The growth process of the resource-poor firm can be broadly divided into three stages: surviving, catching-up, and outcompeting. For ambitious yet pragmatic resource-poor firms, in the surviving stage, they often (have to) accept the asymmetry between themselves and their resource-rich rivals in terms of resource possession and market position, and try to avoid any direct competition with the strong incumbents. They often tactically appear to pursue different paths of development from those of the strong incumbents by focusing on particular product categories and market segments. Doing so allows the resource-poor firms to win times and spaces for non-interrupted growth. Once they have accumulated sufficient resources and market experiences, they start to reduce the asymmetry between themselves and their better-endowed rivals by entering the similar or same product categories and market segments. To effectively catch up and outcompete the incumbents, they often differentiate themselves from their rivals by offering cheaper products or services, adding new features to their products, providing extra services to their customers, inventing new business models, etc.

Research limitations/implications

One limitation of this paper is that the ART framework has so far been built on anecdotal evidences. It needs to be tested by empirical studies and refined further in the future. Another limitation is that the proposed theory is based on competitive dynamics between emerging market resource-poor firms and advanced country resource-rich firms. It needs to be tested whether this theory has applicability to any other firms.

Originality/value

This paper fills an important research gap in the competitive dynamics literature by proposing an asymmetry reversing theory of competitive dynamics between a weak latecomer and a strong incumbent in a competitive field.

Details

Cross Cultural & Strategic Management, vol. 25 no. 3
Type: Research Article
ISSN: 2059-5794

Keywords

Open Access
Article
Publication date: 10 June 2022

Xinyi Huang, Fei Teng, Yu Xin and Liping Xu

This paper aims to study the effect of the establishment of bankruptcy courts on bond issuance market. This paper helps to predict that the introduction of bankruptcy courts in…

Abstract

Purpose

This paper aims to study the effect of the establishment of bankruptcy courts on bond issuance market. This paper helps to predict that the introduction of bankruptcy courts in China can mitigate price distortions caused by the implicit government guarantees and promote the development of the high-risk bond market.

Design/methodology/approach

This paper exploits the staggered introduction of bankruptcy courts across cities to implement a differences-in-differences strategy on bond issuance data. Using bonds issued in China between 2018 and 2020, the impact of bankruptcy courts on the bond issuance market can be analyzed.

Findings

This paper reveals that bond issuance credit spreads increase and is more sensitive to firm size, profitability and downside risk of issuance entity after the introduction of bankruptcy courts. It also reveals a substantive increase in bond issuance quantity and a decrease in issuer credit ratings following the establishment of bankruptcy courts. In addition, the increase of credit spreads is more prominent for publicly traded bonds, those whose issuers located in provinces with lower judicial confidence, bonds issued by SOEs and bonds with stronger government guarantees. Finally, the role of bankruptcy courts is more pronounced in regions with higher marketization.

Originality/value

This paper relates to previous studies that investigate the impact of laws and institutions on external financing. It helps provide new evidence to this literature on how improvements of efficiency and quality in bankruptcy enforcements relate to the marketization of bond issuance. The results provide further evidence on legal institutions and bond financing.

Details

China Accounting and Finance Review, vol. 24 no. 3
Type: Research Article
ISSN: 1029-807X

Keywords

Open Access
Article
Publication date: 13 April 2023

Mohammad Arief, Rita Indah Mustikowati and Yustina Chrismardani

Digitalization in marketing activities has made it easier for people to make purchase decision. This platform encourages every firm to optimize digitalization as part of its…

8723

Abstract

Purpose

Digitalization in marketing activities has made it easier for people to make purchase decision. This platform encourages every firm to optimize digitalization as part of its marketing strategy. Optimization of attractive digital marketing involves advertising attractiveness, influencer marketing and online customer reviews. This study aims to investigate advertising attractiveness, influencer marketing and online customer reviews on purchase decision.

Design/methodology/approach

The study was conducted with a quantitative approach. A total of 120 respondents were involved in this study by using convenience sampling techniques in data collection. Multiple linear regression was used to analyze the data.

Findings

The results of the study show that influencer marketing and online customer reviews have an impact on online purchase decision. Meanwhile, advertising attractiveness does not show any influence on purchase decision.

Practical implications

Despite the start-ups have modified the website by increasing the content to make it more informative, it seems that customers are not interested in making a purchase. Therefore, notwithstanding the role of website attractiveness, the use of physical attractiveness is still considered an effective way to encourage customers to make purchasing decisions. In this way, a firm needs to make adjustments between the customers' personality, lifestyle and attitudes and endorsers.

Originality/value

This study developed previous empirical studies which a positive relationship between advertising attractiveness, influencer marketing, online customer reviews and purchase decision. The development of the model was carried out by elaborating variable indicators. In addition, the source of increasing credibility was not based on physical attractiveness, but rather emphasizes the website quality.

Details

LBS Journal of Management & Research, vol. 21 no. 1
Type: Research Article
ISSN: 0972-8031

Keywords

Open Access
Article
Publication date: 2 June 2020

Jin Zhang, Xiaoming Qian and Jing Feng

Under the global climate change, carbon footprint has become a hot issue at home and abroad. However, there is no consensus on the concept, measurement and application of carbon…

6800

Abstract

Purpose

Under the global climate change, carbon footprint has become a hot issue at home and abroad. However, there is no consensus on the concept, measurement and application of carbon footprint.

Design/methodology/approach

In this paper, first, the concept and connotation of carbon footprint are reviewed; then, different methods of carbon footprint measurement are compared, and it is found that “bottom-up” life cycle assessment and “top-down” input–output analysis are applicable to different research scales.

Findings

Finally, the problems in the process of carbon footprint assessment in textile industry are analyzed and further research directions are proposed.

Originality/value

Analyzed and further research directions are proposed.

Details

Ecofeminism and Climate Change, vol. 1 no. 1
Type: Research Article
ISSN: 2633-4062

Keywords

Open Access
Article
Publication date: 8 February 2021

Xuejun Zhao, Yong Qin, Hailing Fu, Limin Jia and Xinning Zhang

Fault diagnosis methods based on blind source separation (BSS) for rolling element bearings are necessary tools to prevent any unexpected accidents. In the field application, the…

Abstract

Purpose

Fault diagnosis methods based on blind source separation (BSS) for rolling element bearings are necessary tools to prevent any unexpected accidents. In the field application, the actual signal acquisition is usually hindered by certain restrictions, such as the limited number of signal channels. The purpose of this study is to fulfill the weakness of the existed BSS method.

Design/methodology/approach

To deal with this problem, this paper proposes a blind source extraction (BSE) method for bearing fault diagnosis based on empirical mode decomposition (EMD) and temporal correlation. First, a single-channel undetermined BSS problem is transformed into a determined BSS problem using the EMD algorithm. Then, the desired fault signal is extracted from selected intrinsic mode functions with a multi-shift correlation method.

Findings

Experimental results prove the extracted fault signal can be easily identified through the envelope spectrum. The application of the proposed method is validated using simulated signals and rolling element bearing signals of the train axle.

Originality/value

This paper proposes an underdetermined BSE method based on the EMD and the temporal correlation method for rolling element bearings. A simulated signal and two bearing fault signal from the train rolling element bearings show that the proposed method can well extract the bearing fault signal. Note that the proposed method can extract the periodic fault signal for bearing fault diagnosis. Thus, it should be helpful in the diagnosis of other rotating machinery, such as gears or blades.

Details

Smart and Resilient Transportation, vol. 3 no. 1
Type: Research Article
ISSN: 2632-0487

Keywords

Open Access
Article
Publication date: 14 February 2024

Chao Lu and Xiaohai Xin

The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address…

Abstract

Purpose

The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address the societal risks posed by autonomous vehicles, considering collaborative engagement of key stakeholders is essential. This study aims to provide insights into the governance of potential privacy and security issues in the innovation of autonomous driving technology by analyzing the micro-level decision-making processes of various stakeholders.

Design/methodology/approach

For this study, the authors use a nuanced approach, integrating key stakeholder theory, perceived value theory and prospect theory. The study constructs a model based on evolutionary game for the privacy and security governance mechanism of autonomous vehicles, involving enterprises, governments and consumers.

Findings

The governance of privacy and security in autonomous driving technology is influenced by key stakeholders’ decision-making behaviors and pivotal factors such as perceived value factors. The study finds that the governmental is influenced to a lesser extent by the decisions of other stakeholders, and factors such as risk preference coefficient, which contribute to perceived value, have a more significant influence than appearance factors like participation costs.

Research limitations/implications

This study lacks an investigation into the risk sensitivity of various stakeholders in different scenarios.

Originality/value

The study delineates the roles and behaviors of key stakeholders and contributes valuable insights toward addressing pertinent risk concerns within the governance of autonomous vehicles. Through the study, the practical application of Responsible Innovation theory has been enriched, addressing the shortcomings in the analysis of micro-level processes within the framework of evolutionary game.

Details

Asia Pacific Journal of Innovation and Entrepreneurship, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2071-1395

Keywords

1 – 10 of 40